File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: DelPHI: wormhole detection mechanism for ad hoc wireless networks

TitleDelPHI: wormhole detection mechanism for ad hoc wireless networks
Authors
KeywordsSecurity
Wormhole
Tunnel
Ad hoc
Wireless
Issue Date2006
PublisherIEEE.
Citation
The 1st International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 16-18 January 2006 How to Cite?
AbstractIn mobile ad hoc networks, data transmission is performed within an untrusted wireless environment. Various kinds of attack have been identified and corresponding solutions have been proposed. Wormhole attack is one of the serious attacks which forms a serious threat in the networks, especially against many ad hoc wireless routing protocols and location-based wireless security system. We identify two types of wormhole attacks. In the first type, malicious nodes do not take part in finding routes, meaning that, legitimate nodes do not know their existence. In the second type, malicious nodes do create route advertisements and legitimate nodes are aware of the existence of malicious nodes, just do not know they are malicious. Some researchers have proposed detection mechanisms for the first type. In this paper, we propose an efficient detection method called delay per hop indication (DelPHI). By observing the delays of different paths to the receiver, the sender is able to detect both kinds of wormhole attacks. This method requires neither synchronized clocks nor special hardware equipped mobile nodes. The performance of DelPHI is justified by simulations.
Persistent Identifierhttp://hdl.handle.net/10722/45913
ISBN
References

 

DC FieldValueLanguage
dc.contributor.authorChiu, HSen_HK
dc.contributor.authorWong Lui, KSen_HK
dc.date.accessioned2007-10-30T06:38:21Z-
dc.date.available2007-10-30T06:38:21Z-
dc.date.issued2006en_HK
dc.identifier.citationThe 1st International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 16-18 January 2006en_HK
dc.identifier.isbn0-7803-9410-0-
dc.identifier.urihttp://hdl.handle.net/10722/45913-
dc.description.abstractIn mobile ad hoc networks, data transmission is performed within an untrusted wireless environment. Various kinds of attack have been identified and corresponding solutions have been proposed. Wormhole attack is one of the serious attacks which forms a serious threat in the networks, especially against many ad hoc wireless routing protocols and location-based wireless security system. We identify two types of wormhole attacks. In the first type, malicious nodes do not take part in finding routes, meaning that, legitimate nodes do not know their existence. In the second type, malicious nodes do create route advertisements and legitimate nodes are aware of the existence of malicious nodes, just do not know they are malicious. Some researchers have proposed detection mechanisms for the first type. In this paper, we propose an efficient detection method called delay per hop indication (DelPHI). By observing the delays of different paths to the receiver, the sender is able to detect both kinds of wormhole attacks. This method requires neither synchronized clocks nor special hardware equipped mobile nodes. The performance of DelPHI is justified by simulations.en_HK
dc.format.extent2081424 bytes-
dc.format.extent1768 bytes-
dc.format.extent4014 bytes-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypetext/plain-
dc.format.mimetypetext/plain-
dc.languageengen_HK
dc.publisherIEEE.en_HK
dc.relation.ispartofInternational Symposium on Wireless Pervasive Computing Proceedings-
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.rights©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_HK
dc.subjectSecurityen_HK
dc.subjectWormholeen_HK
dc.subjectTunnelen_HK
dc.subjectAd hocen_HK
dc.subjectWirelessen_HK
dc.titleDelPHI: wormhole detection mechanism for ad hoc wireless networksen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailLui, KS: kslui@eee.hku.hk-
dc.identifier.authorityLui, KS=rp00188-
dc.description.naturepublished_or_final_versionen_HK
dc.identifier.doi10.1109/ISWPC.2006.1613586en_HK
dc.identifier.scopuseid_2-s2.0-33750397274-
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-33750397274&selection=ref&src=s&origin=recordpage-
dc.identifier.scopusauthoridChiu, HS=7401986712-
dc.identifier.scopusauthoridLui, KS=7103390016-
dc.customcontrol.immutablesml 160111 - merged-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats